/external/boringssl/src/ssl/test/runner/ |
D | key_agreement.go | 104 if len(ckx.ciphertext) < 2 { 108 ciphertext := ckx.ciphertext 110 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 111 if ciphertextLen != len(ckx.ciphertext)-2 { 114 ciphertext = ckx.ciphertext[2:] 121 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret) 159 ckx.ciphertext = make([]byte, len(encrypted)+2) 160 ckx.ciphertext[0] = byte(len(encrypted) >> 8) 161 ckx.ciphertext[1] = byte(len(encrypted)) 162 copy(ckx.ciphertext[2:], encrypted) [all …]
|
D | chacha20_poly1305.go | 111 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 112 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8) 116 input = append(input, ciphertext...) 118 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext))) 141 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 145 if len(ciphertext) < 16 { 148 plaintextLen := len(ciphertext) - 16 151 c.poly1305(&tag, nonce, ciphertext[:plaintextLen], additionalData) 152 if subtle.ConstantTimeCompare(tag[:], ciphertext[plaintextLen:]) != 1 { 157 c.chaCha20(out, ciphertext[:plaintextLen], nonce, 1)
|
D | ticket.go | 214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size] 215 plaintext := make([]byte, len(ciphertext)) 216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
D | handshake_messages.go | 1195 ciphertext []byte member 1205 bytes.Equal(m.ciphertext, m1.ciphertext) 1212 length := len(m.ciphertext) 1218 copy(x[4:], m.ciphertext) 1233 m.ciphertext = data[4:]
|
/external/boringssl/src/crypto/modes/ |
D | gcm_test.c | 65 const char *ciphertext; member 316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; in run_test_case() local 327 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, in run_test_case() 368 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { in run_test_case() 371 hexdump("want", ciphertext, plaintext_len); in run_test_case() 380 if (ciphertext) { in run_test_case() 381 CRYPTO_gcm128_decrypt(&ctx, ciphertext, out, plaintext_len); in run_test_case() 399 OPENSSL_free(ciphertext); in run_test_case()
|
/external/boringssl/src/crypto/cipher/ |
D | cipher_test.cc | 110 const std::vector<uint8_t> &ciphertext, in TestOperation() argument 116 out = &ciphertext; in TestOperation() 118 in = &ciphertext; in TestOperation() 204 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local 207 !t->GetBytes(&ciphertext, "Ciphertext")) { in TestCipher() 241 ciphertext, aad, tag)) { in TestCipher() 246 ciphertext, aad, tag)) { in TestCipher()
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 71 u_int8_t ciphertext[BCRYPT_HASHSIZE] = in bcrypt_hash() local 89 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), in bcrypt_hash() 103 explicit_bzero(ciphertext, sizeof(ciphertext)); in bcrypt_hash()
|
/external/srtp/srtp/ |
D | ekt.c | 150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { in aes_decrypt_with_raw_key() argument 154 aes_decrypt(ciphertext, expanded_key); in aes_decrypt_with_raw_key()
|
/external/srtp/crypto/cipher/ |
D | cipher.c | 162 if (buffer[i] != test_case->ciphertext[i]) { in cipher_type_self_test() 174 octet_string_hex_string(test_case->ciphertext, in cipher_type_self_test() 199 buffer[i] = test_case->ciphertext[i]; in cipher_type_self_test()
|
/external/boringssl/src/crypto/cipher/test/ |
D | make_legacy_aead_tests.go | 119 ciphertext []byte member 269 ciphertext: sealed[:len(sealed)-hash.Size()], 283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext))
|
D | cipher_test.txt | 59 # AES-bits-ECB:key::plaintext:ciphertext:encdec 105 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
|
D | rc4_sha1_tls_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | des_ede3_cbc_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | rc4_md5_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | aes_256_cbc_sha1_tls_implicit_iv_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | aes_128_cbc_sha1_tls_implicit_iv_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | rc4_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | des_ede3_cbc_sha1_tls_implicit_iv_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | aes_128_cbc_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | rc4_md5_tls_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
/external/srtp/crypto/include/ |
D | cipher.h | 133 uint8_t *ciphertext; /* ciphertext */ member
|
/external/openssh/ |
D | PROTOCOL.chacha20poly1305 | 64 bytes of ciphertext length have been received, they may be decrypted 72 ciphertext of the packet length and the payload together. The calculated
|
D | PROTOCOL | 59 calculating the MAC over the packet ciphertext rather than the 61 protocol, where decryption of unauthenticated ciphertext provided a 66 to calculate the MAC over the packet ciphertext and to send the packet
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 418 char *ciphertext; in test_ecb() member 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) { in test_ecb()
|
/external/libvncserver/libvncclient/ |
D | rfbproto.c | 834 uint8_t userpass[128], ciphertext[128]; in HandleARDAuth() local 960 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); in HandleARDAuth() 967 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext))) in HandleARDAuth()
|